• 1 Post
  • 123 Comments
Joined 2 years ago
cake
Cake day: January 2nd, 2024

help-circle

  • If you use st or havoc and have a tmux configuration that looks like this:

    # Generic Tmux config
    # use emacs keybindings
    setw -g mode-keys emacs
    
    # put the status bar on top
    set -g status-style fg=green
    set-option -g status-position top
    
    # add urxvt keybindings
    
    bind-key -n C-T new-window
    bind-key -n C-pageup prev
    bind-key -n C-pagedown next
    
    # make killing of panes match emacs
    bind k kill-pane
    
    # Improve appearence
    set -g default-terminal "screen-256color"
    set -g pane-border-style fg=green
    set -g pane-active-border-style fg=blue
    
    # Support local files
    if-shell "[ -f ~/.tmux.conf_local ]" 'source ~/.tmux.conf_local'
    

    Then yes you do require tmux as dtach, abduco, dvtm and mtm are not up to the task

    Like seriously let me do ctrl-shift-t to create a full screen tab. Show the running program names on top and let me switch between them with ctrl-pgup and ctrl-pgdn.




  • What do you think stay at home housewives do while the kids are at school for 8 hours a day?

    All of the “cleaning” can be done in 30 minutes if you tune your routine. (Unless you are one of those silly bitches who expects a mansion, that shit takes way more effort to maintain)

    We either spend it on a hobby or on something that we want to achieve (like a rocking body or amazing garden or hand made dresses or world class sniper skills)




  • Ok (forgive my paraphrasing but)

    Listen modern computers are running on billions of lines of code. No one knows what the fuck it is doing.

    Modern CPUs, GPUs and other specialized processors have billions of transistors. No one knows what the fuck it is doing ( read the errata if you don’t believe me)

    So given that you are working on a steaming pile of crap running on a steaming pile of crap. Why the fuck do you think anyone knows what the fuck it is doing?

    If you want to know what a computer is doing get a 6502 or 6809 and flash an eeprom. Otherwise accept things you don’t know about will show up while working on the fuck pile.












  • Do better

    ################################################################################# #################################################################################

    A minimal Arch install procedure with encrypted /boot and /

    ################################################################################# #################################################################################

    Format virtual drive to have 1 large primary partition and mark it as bootable

    echo -e “o\nn\np\n1\n\n\na\nw” | fdisk /dev/sda

    It really is that simple to set up the partition table. o wipes the previous

    table, n creates a new partition, and a makes it bootable. w writes the changes.

    Encrypt entire volume

    Default iter is 2000 and takes 22 seconds for grub to decrypt, adjust accordingly

    cryptsetup -v --cipher aes-xts-plain64 --key-size 512 --hash sha512 --iter-time 50000
    –use-random --verify-passphrase luksFormat --type luks1 /dev/sda1

    or if that takes too long to type or you don’t care; you can use the defaults:

    The luks1 however matters until grub finishes adding sufficient support for

    luks2. Argon2id (cryptsetup default) and Argon2i PBKDFs are not supported, only

    PBKDF2 is at this time

    cryptsetup -v --use-random -y luksFormat --type luks1 /dev/sda1

    Open for formating

    cryptsetup open /dev/sda1 root

    Actually format

    mkfs.btrfs /dev/mapper/root

    Mount partitions

    mount /dev/mapper/root /mnt

    Fix the slow install problem

    pacman -Sy pacman -S pacman-contrib cp /etc/pacman.d/mirrorlist /etc/pacman.d/mirrorlist.backup

    if per policy reasons you need to limit yourself to the USA

    curl “https://archlinux.org/mirrorlist/?country=US” | sed ‘s/#Server/Server/g’ \

    >| /etc/pacman.d/mirrorlist.backup

    rankmirrors -n 6 /etc/pacman.d/mirrorlist.backup > /etc/pacman.d/mirrorlist

    Install bootstrap

    pacstrap /mnt base linux linux-firmware btrfs-progs lvm2

    if you see bill-auger is unknown trust

    pacman -S archlinux-keyring parabola-keyring

    Setup fstab

    genfstab -U /mnt >> /mnt/etc/fstab

    Chroot into mount

    arch-chroot /mnt

    Set root password

    passwd

    Setup timezone

    ln -sf /usr/share/zoneinfo/US/Michigan /etc/localtime

    Setup locales

    echo “en_US.UTF-8 UTF-8” > /etc/locale.gen echo “LANG=en_US.UTF-8” > /etc/locale.conf locale-gen

    Set hostname

    export hostname=encom

    Use it

    echo “$hostname” >| /etc/hostname { cat <<-EOF 127.0.0.1 localhost 127.0.1.1 $hostname

    The following lines are desirable for IPv6 capable hosts

    ::1 localhost ip6-localhost ip6-loopback ff02::1 ip6-allnodes ff02::2 ip6-allrouters EOF } >| /etc/hosts

    Enable dhcp on ethernet

    pacman -S dhclient

    #enable wifi pacman -S iw iwd

    Fix kernel file system

    YES order matters for stupid reasons

    components=“base
    udev
    autodetect
    modconf
    keyboard
    block
    encrypt
    lvm2
    filesystems
    keyboard
    fsck”; sed -i “/^HOOKS=/c\HOOKS=(${components})” /etc/mkinitcpio.conf

    Modify: to add support for encrypt and lvm2

    build new initial ramdisk:

    mkinitcpio -p linux

    May produce warnings about lwn2, can safely ignore

    Setup grub

    pacman -S grub

    indicate /boot is encrypted

    sed -i ‘/^GRUB_CMDLINE_LINUX=/c\GRUB_CMDLINE_LINUX=“cryptdevice=/dev/sda1:root”’
    /etc/default/grub

    Enable support for encrypted /boot

    sed -i ‘/^#GRUB_ENABLE_CRYPTODISK=/c\GRUB_ENABLE_CRYPTODISK=“y”’ /etc/default/grub

    Uncomment GRUB_ENABLE_CRYPTODISK=y

    mkdir /boot/grub grub-mkconfig -o /boot/grub/grub.cfg grub-install /dev/sda

    ################################################################################# #################################################################################

    Reboot as the core setup is done and the rest can be done inside our new arch

    Linux system as root/administrator

    ################################################################################# #################################################################################

    Remove need to type luks password twice

    dd bs=512 count=4 if=/dev/urandom of=/crypto_keyfile.bin chmod 400 /crypto_keyfile.bin cryptsetup luksAddKey /dev/sda1 /crypto_keyfile.bin

    Set init to use that file

    sed -i “/^FILES=/c\FILES=/crypto_keyfile.bin” /etc/mkinitcpio.conf

    build new initial ramdisk:

    mkinitcpio -p linux

    Enable networking

    dhclient ens33

    Setup sudo group for membership and useful privileges

    pacman -S sudo vim wget groupadd sudo

    Uncomment the %sudo line

    sed -i ‘/^# %sudo/c%sudo\tALL=(ALL:ALL) ALL’ /etc/sudoers

    Setup our power user

    export USERNAME=user useradd -m $USERNAME passwd $USERNAME usermod -G sudo -a $USERNAME

    ################################################################################# #################################################################################

    If you want guix for everything else on your system use the install guix

    procedure instead of following the rest of this procedure.

    #################################################################################

    You may now logout and finish the rest of this procedure as your

    administrative account created previously

    ################################################################################# #################################################################################

    Install baseline gui

    sudo pacman -S i3-wm xorg-server xorg-xinit xf86-video-vesa xorg mesa slim
    xorg-xrdb dmenu emacs st git gcc make htop screen
    binutils stow